Chinese Hacking of US Critical Infrastructure Security Everyone is writing about an interagency and international report on… rooter May 31, 2023 1 min read 0
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme Security A peek under the hood of a cybercrime operation and… rooter May 31, 2023 1 min read 0
Brute-Forcing a Fingerprint Reader Security It’s neither hard nor expensive: Unlike password authentication, which requires… rooter May 30, 2023 2 min read 0
Antivirus Security and the Role of Artificial Intelligence (AI) Security With groundbreaking innovations and intelligent machines revolutionizing industries, the advent… rooter May 29, 2023 1 min read 0
Weekly Update 349 Security Presently sponsored by: Kolide can get your cross-platform fleet to… rooter May 27, 2023 2 min read 0
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe Security ESET research uncovers an Android app that initially had no… rooter May 27, 2023 1 min read 0
Friday Squid Blogging: Online Cephalopod Course Security Atlas Obscura has a five-part online course on cephalopods, taught… rooter May 26, 2023 1 min read 0
Expeditionary Cyberspace Operations Security Cyberspace operations now officially has a physical dimension, meaning that… rooter May 26, 2023 2 min read 0
Find APIs Hiding in the Shadows Security What’s hiding in the shadows? It’s a well understood reality… rooter May 25, 2023 3 min read 0
Shedding light on AceCryptor and its operation Security ESET researchers reveal details about a prevalent cryptor, operating as… rooter May 25, 2023 1 min read 0